datasheet
Trend Micro™
deep security as a service Advanced Security Built for the Cloud
Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers including Amazon Web Services, Microsoft Azure, VMware vCloud and others. To ensure an end-to-end secure computing environment, cloud providers employ a shared security responsibility model with their customers. While the cloud provider delivers secure facilities and processes, it is up to organizations to protect their cloud workloads, including operating systems, applications, and data. Built on Trend Micro’s industry leading cloud and data center security solution, Trend Micro Deep Security as a Service is designed specifically to complement cloud provider security so that organizations can be fully protected and worry free. The Deep Security service provides a complete suite of security capabilities including firewall, intrusion detection and prevention, anti-malware, integrity monitoring, log inspection, and web reputation. Deep Security as a Service was developed specifically for securing cloud workloads. This highly optimized security offering is cloud based for quick setup and automates and simplifies security operations for cloud instances. Deep Security as a Service is elastic, dynamic and flexible–all characteristics necessary to enable organizations to fully exploit the benefits of cloud computing while remaining protected.
Key Benefits Deep Security as a Service
•• Security and compliance with a broad set of recommended security capabilities for the deployment of AWS instances
•• Fast deployment from the cloud reduces setup time and eliminates hardware
•• Minimal change to deployment with support for leading cloud deployment tools
•• Lowered risk with instances automatically recognized and secured upon their launch
•• Easy management from an integrated console with customizable policy rules and templates
•• Built on proven technology selected by thousands of customers to secure millions of servers
Maximize Operational Cost Reductions
Prevent Data Breaches and Business Disruptions
Achieve Cost-Effective Compliance
•• Avoids setup and hardware costs by hosting
•• Detects and removes malware in real time
•• Addresses major compliance requirements
on leading cloud provider platforms
•• Saves the effort to deploy and manage disparate products with a single suite of security capabilities
•• Reduces administrative workload with automatic recognition of new instances
•• Provides vulnerability protection to prioritize secure coding and cost-effective implementation of unscheduled patching
•• Reduces management costs by automating repetitive and resource intensive security tasks, reducing false positive security alerts, and enabling workflow of security incident response
Page 1 of 4 • datasheet • deep security as a service
with minimal performance impact
•• Blocks malware that attempts to evade detection by uninstalling or otherwise disrupting the security program
•• Reduces exposure to attack by ensuring cloud servers are only communicating with expected systems
•• Shields known and unknown vulnerabilities •• Detects and alerts suspicious or malicious activity to trigger proactive, preventive actions
•• Leverages the web reputation capabilities by controlling server communication at the domain level
for PCI DSS 2.0, as well as HIPAA, NIST, and SAS 70 with one integrated and cost-effective solution
•• Provides detailed, auditable reports that document prevented attacks and policy compliance status
•• Reduces the preparation time and effort required to support audits
•• Supports internal compliance initiatives to increase visibility of internal network activity
•• Leverages proven technology certified to Common Critera EAL4+
key features Anti-Malware
Intrusion Detection and Prevention
Bidirectional Stateful Firewall
•• Optimizes security operations to avoid
•• Protects against known and zero-day
•• Decreases the attack surface of each cloud
antivirus storms commonly seen in full system scans and pattern updates
attacks by shielding known vulnerabilities from unlimited exploits
•• Tamper-proofs security from sophisticated
•• Examines all incoming and outgoing traffic
attacks in virtual environments by isolating malware from anti-malware
for protocol deviations, policy violations, or content that signals an attack
•• Automatically shields newly discovered vulnerabilities from attack with auto-updating security policies
Integrity Monitoring •• Monitors and tracks both authorized and unauthorized changes made to an instance and detects and reports malicious and unexpected changes in real time
web applications and the data they process
•• Defends against SQL injection, cross-site scripting, and other web application vulnerabilities
•• Shields against vulnerabilities until code fixes can be completed
•• Includes out-of-the-box vulnerability protection for all major operating systems and over 100 applications, including database, web, email, and FTP servers
Web Reputation •• Integrates with Trend Micro™ Smart Protection Network™ for web reputation capabilities to reduce the risk of communicating with compromised domain servers
•• Provides increased visibility into, or control over applications accessing the network
Clear Control at Your Fingertips •• Enables policy-driven management and administration •• Customizable dashboard enables users to see the health of their security environment at a glance
•• Customizable policy templates allow users to enable and disable security controls on the fly based on rules they assigned
•• Provides users with immediate notification of events or activities that may require their immediate attention (Logging Alert)
Page 2 of 4 • datasheet • deep security as a service
•• Centrally manages server firewall policy, including templates for common server types
•• Prevents denial-of-service attacks and detects reconnaissance scans
•• Assists compliance (PCI DSS 6.6) to protect
•• Reduces administrative overhead with trusted event tagging that automatically replicates actions for similar events
server by creating a firewall perimeter to block attacks and limit communication to only the ports and protocols necessary
Log Inspection •• Collects and analyzes operating system and application logs for suspicious behavior, security events, and administrative events across your cloud instances
•• Assists compliance (PCI DSS 10.6) to optimize the identification of important security events buried in multiple log entries
•• Forwards events to SIEM system or centralized logging server for correlation, reporting, and archiving
Alerts
cloud Instances
deep security as a service
integrated Dashboard
Reports
Administrator
Deep Security Agent
Deep Security as a Service Helps You Resolve Key Business Issues
Elastic, Seamless and Stress-Free •• Designed to seamlessly integrate with cloud infrastructure security controls, making it fast and easy for users to get up and running in minutes
•• Works seamlessly with industry-leading cloud management tools such as Chef, Puppet, Rightscale and others
•• Enables cloud instances to be immediately secured regardless of the deployment method (Active Protection)
•• The AutoSync feature detects new instances and provides detailed information that can be used to automatically set security policy without administrative intervention
Built for Security in the Cloud Trend Micro Deep Security as a Service is optimized for leading cloud providers’ infrastructures, including support of the most common instance types:
Zero-Day Security Protection against zero-day malware while minimizing operational impact from resource inefficiencies and emergency patching Compliance Achieve and prove compliance to a number of regulatory requirements including PCI DSS 2.0, FIPAA, FISMA/NIST, NERC, SAS 70 and more Integrated Security Consolidate all security point products into one comprehensive platform that optimizes protection across all cloud instances
And compatibility with cloud management tools:
®
Page 3 of 4 • datasheet • deep security as a service
Virtual Patching Shield vulnerabilities before they can be exploited and eliminate the operational pains of emergency patching, frequent patch cycles, and costly system downtime
Supported Platforms
Key Certifications and Alliances
•• •• •• •• ••
•• Common Criteria EAL 4+
Microsoft Windows (32/64 bit) Amazon Linux AMI (32/64 bit) Ubuntu (64 bit) Red Hat® Enterprise 4, 5, 6 (32-bit/64-bit)1 SUSE® Enterprise 10, 11 (32-bit/64-bit)1
•• PCI Suitability Testing for HIPS (Nss Labs)
•• Visualization by VMware •• Microsoft Application Protection Program •• Microsoft Certified Partnership
Deep Security as a Service fits how enterprises use the cloud. Customers can deploy in the cloud with the investment model that is consistent with how they purchase cloud services–paying on-demand with a credit card within the application, or for reserved instance security, via the Trend Micro sales channel.
•• Oracle Partnership •• HP Business Partnership •• Certified Red Hat Ready Certification for CSPs
Flexible Pricing to Meet Cloud Needs Deep Security as a Service provides flexible pricing to reflect how you use the cloud. You can pay only for what you use with a simple per hour rate for securing your cloud instances. There is no minimum fee. Billing is monthly via credit card.
Trend Ready for Cloud Service Providers is a global testing program designed for Cloud Service Providers (CSPs) to prove interoperability with industry-leading cloud security solutions from Trend Micro.
You can also purchase as an annual-per-server subscription. For this and other purchasing options, please contact your Trend Micro sales representative or reseller, or contact us at 1-877-218-7363. Special Pricing for AWS Deep Security as a Service also introduces special pricing for Amazon Web Services that delivers unprecedented value and that reflects how you use AWS. Not only do you pay only for what you use without minimum fees, your costs are based on EC2 instance pricing. With Deep Security as a Service, you only pay for security you use at a rate of 20% of the EC2 price for the instances you are protecting. For example:
•• Securing a Small Instance costs 20% of the current AWS EC2 price (for example, $0.060 per hour) for a cost of $0.012 per hour.
•• Securing an Extra Large Instance costs 20% of the current AWS EC2 price (for example, $0.480 per hour) for a cost of $0.096 per hour. This AWS special pricing requires the use of the Deep Security AWS Connector to detect AWS instance types. Otherwise charges of $0.10 per hour will apply. Pricing is based on Linux, On-Demand Instance price in the US East (N. Virginia) data center. This assures you the lowest cost regardless of what O/S or Region you actually use. As EC2 Pricing changes, your costs will automatically be updated!
Securing Your Journey to the Cloud
©2014 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [DS02_DSaaS_140508US]
Page 4 of 4 • datasheet • deep security as a service